Research Article
A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features
Table 2
The performance of existing coverless image steganography algorithms in terms of capacity, robustness, and security.
| Algorithm | Capacity | Robustness to various image attacks | Security problem |
| LDA_DCT [18] | Lower | Lower | Requires transmitting the image blocks’ positions, and repeatedly transmitting the same image |
| DenseNet_DWT [19] | Lower | Lower | Requires transmitting the image blocks’ positions, and repeatedly transmitting the same image |
| Faster-RCNN [35] | High | Moderate | Requires sharing the same feature extracting networks, and repeatedly transmitting the same image |
| DCMH-CNN [32] | High | High | Requires sharing the same feature extracting networks, cluster center K, and repeatedly transmitting the same image |
| The proposed method | High | High | No any additional information | No repeatedly transmitting the same image |
|
|